DATE: Thursday, 20 May TIME: 3:30 PM LOCATION: Online COST: Free
Join the virtual Healthcare Roundtable hosted by Forescout at 3:30 pm, 20 May, to discuss with your peers the cyber security challenges healthcare organisations are facing in the UK.
Today’s Healthcare organisations are incredibly complex - with a broad range of IT, IoT and specific Medical Devices becoming increasingly interconnected. The growing number and diversity of these devices has introduced new cybersecurity risks and led to an increase in the number and sophistication of cyberattacks specifically targeting healthcare sector.
‘Using the Forescout Device Cloud to analyse the security of a wide range of healthcare organisations, we have identified major risks associated with the use of legacy systems and insufficient segmentation.’ - Forescout Research Labs
Join this interactive Healthcare Roundtable event to discuss with your peers the specific security challenges facing healthcare organisations and the possible solutions from Forescout.
They will cover:
- The findings of the 2020 Healthcare Research Report
- Best Practice Use Cases for Healthcare
- The Forescout Solution for Healthcare
- Healthcare Panel discussion
Register Now
Security Resources

Managed Security Services: What you need to know
The rise of remote working makes protecting endpoints more difficult. Many companies have created vulnerabilities in their networks. Often infections can go undetected for days and weeks, costing you thousands not only in lost revenue and customers but also in reputational damages.

Business Tips: #2 Your Cybersecurity
If you are allowing devices to connect from people’s houses – it's possible that these networks have already been compromised by hackers or will be in the future. Implementing two-factor authentication, where another device like a mobile phone is used for extra security is the most important security measure that can be applied to systems.

The Building Blocks of Security and Compliance in UK Healthcare Organisations
Healthcare organisations can open serious security gaps in their network if they do not follow the right steps to migrate to the cloud.